Articles about Privacy
The parliamentary committee inquiring into the laws allowing Australian government agencies to block websites has received calls for an independent party to oversee the scheme.
Australian Prime Minister Tony Abbott wants the government's proposed mandatory data-retention scheme passed into law this week.
At this year's MWC, mobile execs mull how best to balance consumers' right to privacy with the industry's hunger for data.
The Australian government is taking on all 39 recommendations made by the parliamentary committee reviewing its controversial data-retention Bill.
If MPs can't even be bothered to learn about the work tools they use every day, what hope is there for intelligent debate on mandatory data retention?
Security and privacy were top issues in 2014, and so Tech Pro Research conducted a survey to find out what companies are planning for 2015. Now more than ever, security and privacy protections are of paramount...
from TechProResearch »
The next evolution of the internet will embed sensors into nearly everything around us. Dealing with the privacy and security implications of that will be one of the biggest challenges of the next century.
Uber said it is notifying impacted drivers now, but it hasn't seen the compromised data actually misused yet.
The Joint Parliamentary Committee on Intelligence and Security has recommended that parliament pass data-retention legislation.
Forget about net neutrality and balkanisation; Lenovo's Superfish idiocy proves that we already have a dual-class internet -- and most of us are proles.
MPs of the Australian Labor Party are expected to vote for mandatory data-retention legislation when it is debated in parliament in March.
CloudFlare has gone beyond offering free SSL to millions of websites and is now deploying a new level of encryption by default.
No search result is a passive reproduction of data from a "public domain". Google makes the public domain public. Search underpins a massive profit-making machine.
Belgian academics find that Facebook's aversion to opt-in settings could mean its new data policy contravenes European legislation on a number of fronts.
Problems still plague exchanging information amongst Australia's counter-terrorism authorities, the government's review of counter-terrorism arrangements has said.
Policymaking should be about evidence-based improvement, not just leaving swathes of destruction around you. Yet, as the Coalition tries to ramrod data retention into existence, the real costs of policy self-obsession are once again becoming clear.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are a number of ways you can secure your home wireless network.
When a person passes away, their social account can become a memorial of their life, friendships and experiences. See step-by-step instructions for selecting your legacy contact.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
How do you vanish online? Follow these 10 steps to get started.
The new Apple software and new hardware for it have many features that could present problems for enterprises if IT doesn't prepare.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Have you ever wondered how social networking sites seem to know so much about you and your preferences? We take the lid off how these sites gather data about your activities.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
Welcome to the official 2013 edition of our ZDNet DIY-IT Gift Guide. This year, in honor of 2013, we present to you 14 interesting and useful products that the DIY-ITer in your life will find particularly useful, fun, or cool.
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
ZDNet looks back at the year, on a month-by-month basis, at some of the most publicized hacks, leaks and data breaches of 2012.
If you think the government cannot and does not want to get its hands all over your personal data, then think again.
At the Where 2.0 conference in San Jose, Calif., Deborah Estrin, a professor of computer science at UCLA, says the capability of GPS mobile phones to record location over time creates a new wealth of analytics. For example, new opportunities will exist where information is gathered from multiple users that better enables the accuracy of local traffic conditions.
There are no privacy issues with Google Street View, a Maps-based project that offers 360-degree panoramic views of various streets in cities around the US, according to Google Australia's head of engineering. At the Google developer day in Sydney last week, Lars Rasmussen denied that privacy was an issue when it came to Google Street View because, he said, the images are all taken in "public areas".
The success of the proposed Access Card rests on how the private sector puts it to use, according to Australian Federal Police (AFP) Commissioner Mick Keelty.Keelty believes the private sector may use the Access Card as a general ID card when its real purpose was to ensure that the "right people" receive access to needed government services such as Medicare.
Chertoff, secretary of the U.S. Department of Homeland Security, appears at the opening of the Joint Regional Intelligence Center in Norwalk, Calif., on Friday, Aug. 18, saying that his department is indeed concerned with privacy. The intelligence center joins federal, state and local law enforcement in one facility as part of a post-9/11 effort to improve law enforcement collaboration.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
A well-designed program, Spy Sweeper is both classy and effective.Webroot Spy Sweeper 2.
The best of ZDNet, delivered
- 1 Four privacy settings you should enable in iOS 7 immediately
- 2 How to lock down an insecure wireless network router
- 3 Want to make money mining bitcoins? Criminals have you beat
- 4 Why the iOS 'Limit Ad Tracking' setting is more important than ever
- 5 Yes, the FBI and CIA can read your email. Here's how